Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Toshihiro Yamauchi
@article{DBLP:journals/compsec/AkiyamaSFYSY23, author = {Mitsuaki Akiyama and Shugo Shiraishi and Akifumi Fukumoto and Ryota Yoshimoto and Eitaro Shioji and Toshihiro Yamauchi}, title = {Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey}, journal = {Comput. Secur.}, volume = {133}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103389}, doi = {10.1016/J.COSE.2023.103389}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/KuzunoY23, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Protection Mechanism of Kernel Data Using Memory Protection Key}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1326--1338}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022icp0013}, doi = {10.1587/TRANSINF.2022ICP0013}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/KuzunoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NorimatsuNY23, author = {Takashi Norimatsu and Yuichi Nakamura and Toshihiro Yamauchi}, title = {Policy-Based Method for Applying OAuth 2.0-Based Security Profiles}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {106}, number = {9}, pages = {1364--1379}, year = {2023}, url = {https://doi.org/10.1587/transinf.2022icp0004}, doi = {10.1587/TRANSINF.2022ICP0004}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NorimatsuNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/SatoOYT23, author = {Masaya Sato and Taku Omori and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor}, journal = {Int. J. Netw. Comput.}, volume = {13}, number = {2}, pages = {273--286}, year = {2023}, url = {http://www.ijnc.org/index.php/ijnc/article/view/310}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnc/SatoOYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/FujiiKSY23, author = {Shota Fujii and Nobutaka Kawaguchi and Tomohiro Shigemoto and Toshihiro Yamauchi}, title = {Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of {CTI} Sources}, journal = {J. Inf. Process.}, volume = {31}, pages = {578--590}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.578}, doi = {10.2197/IPSJJIP.31.578}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/FujiiKSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KuzunoY23, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism}, journal = {J. Inf. Process.}, volume = {31}, pages = {788--801}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.788}, doi = {10.2197/IPSJJIP.31.788}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/KuzunoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/MikiYK23, author = {Masato Miki and Toshihiro Yamauchi and Satoru Kobayashi}, title = {Evaluation of Effectiveness of {MAC} Systems Based on {LSM} for Protecting IoT Devices}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023, Matsue, Japan, November 28 - Dec. 1, 2023}, pages = {161--167}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDAR60563.2023.00029}, doi = {10.1109/CANDAR60563.2023.00029}, timestamp = {Fri, 16 Feb 2024 13:45:14 +0100}, biburl = {https://dblp.org/rec/conf/candar/MikiYK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/SatoOYT23, author = {Masaya Sato and Taku Omori and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Supporting Multiple {OS} Types on Estimation of System Call Hook Point by Virtual Machine Monitor}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {267--273}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00051}, doi = {10.1109/CANDARW60564.2023.00051}, timestamp = {Thu, 22 Feb 2024 20:44:52 +0100}, biburl = {https://dblp.org/rec/conf/candar/SatoOYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/ShibaKY23, author = {Kaito Shiba and Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Prevention Method for Stack Buffer Overflow Attack in {TA} Command Calls in {OP-TEE}}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {274--278}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00052}, doi = {10.1109/CANDARW60564.2023.00052}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/candar/ShibaKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/candar/VictorKY23, author = {Hervet Victor and Satoru Kobayashi and Toshihiro Yamauchi}, title = {Analyzing Post-injection Attacker Activities in IoT Devices: {A} Comprehensive Log Analysis Approach}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023 - Workshops, Matsue, Japan, November 27-30, 2023}, pages = {292--297}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDARW60564.2023.00055}, doi = {10.1109/CANDARW60564.2023.00055}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/candar/VictorKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/Regal-MezinKY23, author = {Colin Regal{-}Mezin and Satoru Kobayashi and Toshihiro Yamauchi}, editor = {Gareth Tyson and Matteo Varvello}, title = {netroub: Towards an Emulation Platform for Network Trouble Scenarios}, booktitle = {Proceedings of the on CoNEXT Student Workshop 2023, CoNEXT-SW 2023, Paris, France, 8 December 2023}, pages = {17--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3630202.3630222}, doi = {10.1145/3630202.3630222}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/Regal-MezinKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KuzunoY23, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Shujun Li and Mark Manulis and Atsuko Miyaji}, title = {{KDRM:} Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack}, booktitle = {Network and System Security - 17th International Conference, {NSS} 2023, Canterbury, UK, August 14-16, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13983}, pages = {61--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39828-5\_4}, doi = {10.1007/978-3-031-39828-5\_4}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/KuzunoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KuzunoYOHY23, author = {Hiroki Kuzuno and Tomohiko Yano and Kazuki Omo and Jeroen van der Ham and Toshihiro Yamauchi}, editor = {Howon Kim and Jonghee M. Youn}, title = {Security Risk Indicator for Open Source Software to Measure Software Development Status}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {143--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_12}, doi = {10.1007/978-981-99-8024-6\_12}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KuzunoYOHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/Yamauchi22, author = {Toshihiro Yamauchi}, title = {Foreword}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {105-D}, number = {12}, pages = {1998}, year = {2022}, url = {https://doi.org/10.1587/transinf.2022paf0001}, doi = {10.1587/TRANSINF.2022PAF0001}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/Yamauchi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KuzunoY22, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism}, journal = {J. Inf. Process.}, volume = {30}, pages = {563--576}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.563}, doi = {10.2197/IPSJJIP.30.563}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KuzunoY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/IchiokaPMNY22, author = {Shuichi Ichioka and Estelle Pouget and Takao Mimura and Jun Nakajima and Toshihiro Yamauchi}, title = {Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services}, journal = {J. Inf. Process.}, volume = {30}, pages = {601--612}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.601}, doi = {10.2197/IPSJJIP.30.601}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/IchiokaPMNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KuzunoY22a, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism}, journal = {J. Inf. Process.}, volume = {30}, pages = {796--806}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.796}, doi = {10.2197/IPSJJIP.30.796}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/KuzunoY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/FujiiYY22, author = {Shota Fujii and Rei Yamagishi and Toshihiro Yamauchi}, title = {Survey and Analysis on ATT{\&}CK Mapping Function of Online Sandbox for Understanding and Efficient Using}, journal = {J. Inf. Process.}, volume = {30}, pages = {807--821}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.807}, doi = {10.2197/IPSJJIP.30.807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/FujiiYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/MoriyamaYST22, author = {Hideaki Moriyama and Toshihiro Yamauchi and Masaya Sato and Hideo Taniguchi}, title = {Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on {KVM}}, journal = {J. Internet Serv. Inf. Secur.}, volume = {12}, number = {1}, pages = {26--43}, year = {2022}, url = {https://doi.org/10.22667/JISIS.2022.02.28.026}, doi = {10.22667/JISIS.2022.02.28.026}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/MoriyamaYST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BabaBY22, author = {Takahiro Baba and Kensuke Baba and Toshihiro Yamauchi}, editor = {Leonard Barolli and Farookh Hussain and Tomoya Enokido}, title = {Malware Classification by Deep Learning Using Characteristics of Hash Functions}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {450}, pages = {480--491}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99587-4\_40}, doi = {10.1007/978-3-030-99587-4\_40}, timestamp = {Thu, 31 Mar 2022 15:30:21 +0200}, biburl = {https://dblp.org/rec/conf/aina/BabaBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SatoOYT22, author = {Masaya Sato and Taku Omori and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Hook Point Estimation for System Call Detection by Virtual Machine Monitor}, booktitle = {2022 Tenth International Symposium on Computing and Networking, {CANDAR} 2022 - Workshops, Himeji, Japan, November 21-24, 2022}, pages = {358--362}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CANDARW57323.2022.00069}, doi = {10.1109/CANDARW57323.2022.00069}, timestamp = {Thu, 23 Mar 2023 08:30:32 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SatoOYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/FujiiKKSY22, author = {Shota Fujii and Nobutaka Kawaguchi and Shoya Kojima and Tomoya Suzuki and Toshihiro Yamauchi}, editor = {Tokuro Matsuo and Kunihiko Takamatsu and Yuichi Ono}, title = {Design and Implementation of System for {URL} Signature Construction and Impact Assessment}, booktitle = {12th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2022, Kanazawa, Japan, July 2-8, 2022}, pages = {95--100}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IIAIAAI55812.2022.00028}, doi = {10.1109/IIAIAAI55812.2022.00028}, timestamp = {Tue, 04 Oct 2022 17:55:04 +0200}, biburl = {https://dblp.org/rec/conf/iiaiaai/FujiiKKSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/SatoNYT22, author = {Masaya Sato and Ryosuke Nakamura and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Tokuro Matsuo and Kunihiko Takamatsu and Yuichi Ono}, title = {Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection}, booktitle = {12th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2022, Kanazawa, Japan, July 2-8, 2022}, pages = {113--117}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IIAIAAI55812.2022.00031}, doi = {10.1109/IIAIAAI55812.2022.00031}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiaiaai/SatoNYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY22, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {{KDPM:} Kernel Data Protection Mechanism Using a Memory Protection Key}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {66--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_4}, doi = {10.1007/978-3-031-15255-9\_4}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FujiiKSY22, author = {Shota Fujii and Nobutaka Kawaguchi and Tomohiro Shigemoto and Toshihiro Yamauchi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {CyNER: Information Extraction from Unstructured Text of {CTI} Sources with Noncontextual IOCs}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {85--104}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_5}, doi = {10.1007/978-3-031-15255-9\_5}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FujiiKSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/openidentity/NorimatsuNY22, author = {Takashi Norimatsu and Yuichi Nakamura and Toshihiro Yamauchi}, editor = {Heiko Ro{\ss}nagel and Christian H. Schunck and Sebastian M{\"{o}}dersheim}, title = {Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak}, booktitle = {Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022}, series = {{LNI}}, volume = {{P-325}}, pages = {87--98}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/OID2022\_07}, doi = {10.18420/OID2022\_07}, timestamp = {Tue, 04 Jul 2023 17:42:04 +0200}, biburl = {https://dblp.org/rec/conf/openidentity/NorimatsuNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KuzunoY22, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Ilsun You and Taek{-}Young Youn}, title = {vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {222--234}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_16}, doi = {10.1007/978-3-031-25659-2\_16}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KuzunoY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KuzunoY21, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism}, journal = {{IEEE} Access}, volume = {9}, pages = {111651--111665}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3101452}, doi = {10.1109/ACCESS.2021.3101452}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KuzunoY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YamauchiAYNH21, author = {Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani and Yuichi Nakamura and Masaki Hashimoto}, title = {Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {4}, pages = {461--473}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00514-7}, doi = {10.1007/S10207-020-00514-7}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/YamauchiAYNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ImamuraOUCLSY21, author = {Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and Kritsana Chaikaew and Pattara Leelaprute and Masaya Sato and Toshihiro Yamauchi}, title = {Web access monitoring mechanism via Android WebView for threat analysis}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {6}, pages = {833--847}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00534-3}, doi = {10.1007/S10207-020-00534-3}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ImamuraOUCLSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/OtaniOYMST21, author = {Kohei Otani and Toshiki Okazaki and Toshihiro Yamauchi and Hideaki Moriyama and Masaya Sato and Hideo Taniguchi}, title = {Function for Tracing Diffusion of Classified Information to Support Multiple VMs with {KVM}}, booktitle = {Ninth International Symposium on Computing and Networking, {CANDAR} 2021 - Workshops, Matsue, Japan, 23-26 November 2021}, pages = {352--358}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CANDARW53999.2021.00066}, doi = {10.1109/CANDARW53999.2021.00066}, timestamp = {Fri, 18 Feb 2022 10:36:44 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/OtaniOYMST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY21, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {{KPRM:} Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {45--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_3}, doi = {10.1007/978-3-030-85987-9\_3}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21, author = {Toru Nakamura and Hiroshi Ito and Shinsaku Kiyomoto and Toshihiro Yamauchi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {64--73}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_4}, doi = {10.1007/978-3-030-85987-9\_4}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/KusunokiYT21, author = {Koki Kusunoki and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Leonard Barolli and Hsing{-}Chung Chen and Tomoya Enokido}, title = {Physical Memory Management with Two Page Sizes in Tender {OS}}, booktitle = {Advances in Networked-Based Information Systems - The 24th International Conference on Network-Based Information Systems (NBiS-2021), Taichung, Taiwan, 1-3 September, 2021}, series = {Lecture Notes in Networks and Systems}, volume = {313}, pages = {238--248}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84913-9\_22}, doi = {10.1007/978-3-030-84913-9\_22}, timestamp = {Thu, 12 Aug 2021 13:43:08 +0200}, biburl = {https://dblp.org/rec/conf/nbis/KusunokiYT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/KuzunoY20, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, title = {Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {7}, pages = {1462--1475}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019ICP0011}, doi = {10.1587/TRANSINF.2019ICP0011}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/KuzunoY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/IshiharaSY20, author = {Takashi Ishihara and Masaya Sato and Toshihiro Yamauchi}, title = {Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites}, booktitle = {Eighth International Symposium on Computing and Networking Workshops, {CANDAR} 2020 Workshops, Naha, Japan, November 24-27, 2020}, pages = {328--333}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CANDARW51189.2020.00070}, doi = {10.1109/CANDARW51189.2020.00070}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic-nc/IshiharaSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KuzunoY20, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {{MKM:} Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {97--116}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_6}, doi = {10.1007/978-3-030-58208-1\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KuzunoY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/MoriyamaYST20, author = {Hideaki Moriyama and Toshihiro Yamauchi and Masaya Sato and Hideo Taniguchi}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Makoto Takizawa}, title = {Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on {KVM}}, booktitle = {Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020, Victoria, BC, Canada, 31 August - 2 September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1264}, pages = {338--349}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57811-4\_32}, doi = {10.1007/978-3-030-57811-4\_32}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/MoriyamaYST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IchiokaPMNY20, author = {Shuichi Ichioka and Estelle Pouget and Takao Mimura and Jun Nakajima and Toshihiro Yamauchi}, editor = {Ilsun You}, title = {Accessibility Service Utilization Rates in Android Applications Shared on Twitter}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {101--111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_8}, doi = {10.1007/978-3-030-65299-9\_8}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/IchiokaPMNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssc/SatoTY19, author = {Masaya Sato and Hideo Taniguchi and Toshihiro Yamauchi}, title = {Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor}, journal = {Int. J. Space Based Situated Comput.}, volume = {9}, number = {1}, pages = {1--10}, year = {2019}, url = {https://doi.org/10.1504/IJSSC.2019.100007}, doi = {10.1504/IJSSC.2019.100007}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssc/SatoTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/ImamuraOCMLSY19, author = {Yuta Imamura and Rintaro Orito and Kritsana Chaikaew and C{\'{e}}lia Manardo and Pattara Leelaprute and Masaya Sato and Toshihiro Yamauchi}, title = {Threat Analysis of Fake Virus Alerts Using WebView Monitor}, booktitle = {2019 Seventh International Symposium on Computing and Networking, {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019}, pages = {28--36}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CANDAR.2019.00012}, doi = {10.1109/CANDAR.2019.00012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic-nc/ImamuraOCMLSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KuzunoY19, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {{KMO:} Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {75--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_5}, doi = {10.1007/978-3-030-34339-2\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KuzunoY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoIOY19, author = {Masaya Sato and Yuta Imamura and Rintaro Orito and Toshihiro Yamauchi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) Method for Preventing Suspicious Web Access in Android WebView}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {241--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_14}, doi = {10.1007/978-3-030-26834-3\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoIOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KudoYA18, author = {Naoki Kudo and Toshihiro Yamauchi and Thomas H. Austin}, title = {Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications}, journal = {J. Inf. Process.}, volume = {26}, pages = {396--405}, year = {2018}, url = {https://doi.org/10.2197/ipsjjip.26.396}, doi = {10.2197/IPSJJIP.26.396}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KudoYA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/ImamuraUISY18, author = {Yuta Imamura and Hiroyuki Uekawa and Yasuhiro Ishihara and Masaya Sato and Toshihiro Yamauchi}, editor = {David Abramson}, title = {Web access monitoring mechanism for Android webview}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2018, Brisbane, QLD, Australia, January 29 - February 02, 2018}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167918.3167942}, doi = {10.1145/3167918.3167942}, timestamp = {Tue, 20 Jun 2023 16:27:45 +0200}, biburl = {https://dblp.org/rec/conf/acsw/ImamuraUISY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/YamauchiAYNH18, author = {Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani and Yuichi Nakamura and Masaki Hashimoto}, title = {Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625137}, doi = {10.1109/DESEC.2018.8625137}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/YamauchiAYNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YamamotoNYNT18, author = {Masao Yamamoto and Kohta Nakashima and Toshihiro Yamauchi and Akira Nagoya and Hideo Taniguchi}, title = {Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines}, booktitle = {Sixth International Symposium on Computing and Networking, {CANDAR} Workshops 2018, Takayama, Japan, November 27-30, 2018}, pages = {152--158}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CANDARW.2018.00035}, doi = {10.1109/CANDARW.2018.00035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YamamotoNYNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/BanY18, author = {Yuya Ban and Toshihiro Yamauchi}, title = {Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory}, booktitle = {Sixth International Symposium on Computing and Networking, {CANDAR} Workshops 2018, Takayama, Japan, November 27-30, 2018}, pages = {398--404}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CANDARW.2018.00080}, doi = {10.1109/CANDARW.2018.00080}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/BanY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SatoTY18, author = {Masaya Sato and Hideo Taniguchi and Toshihiro Yamauchi}, editor = {Leonard Barolli and Natalia Kryvinska and Tomoya Enokido and Makoto Takizawa}, title = {Hiding File Manipulation of Essential Services by System Call Proxy}, booktitle = {Advances in Network-Based Information Systems, The 21st International Conference on Network-Based Information Systems, NBiS-2018, Bratislava, Slovakia, 5-7 September 2018}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {22}, pages = {853--863}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98530-5\_76}, doi = {10.1007/978-3-319-98530-5\_76}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/SatoTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamauchiIB17, author = {Toshihiro Yamauchi and Yuta Ikegami and Yuya Ban}, title = {Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {10}, pages = {2295--2306}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016INP0020}, doi = {10.1587/TRANSINF.2016INP0020}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamauchiIB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamauchiA17, author = {Toshihiro Yamauchi and Yohei Akao}, title = {Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {10}, pages = {2377--2381}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016INL0003}, doi = {10.1587/TRANSINF.2016INL0003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamauchiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Yamauchi17, author = {Toshihiro Yamauchi}, title = {Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks}, journal = {J. Inf. Process.}, volume = {25}, pages = {852--853}, year = {2017}, url = {https://doi.org/10.2197/ipsjjip.25.852}, doi = {10.2197/IPSJJIP.25.852}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/Yamauchi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KudoYA17, author = {Naoki Kudo and Toshihiro Yamauchi and Thomas H. Austin}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu and Chi{-}Yi Lin}, title = {Access Control for Plugins in Cordova-Based Hybrid Applications}, booktitle = {31st {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2017, Taipei, Taiwan, March 27-29, 2017}, pages = {1063--1069}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AINA.2017.61}, doi = {10.1109/AINA.2017.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KudoYA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/MoriyamaYST17, author = {Hideaki Moriyama and Toshihiro Yamauchi and Masaya Sato and Hideo Taniguchi}, title = {Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on {KVM}}, booktitle = {Fifth International Symposium on Computing and Networking, {CANDAR} 2017, Aomori, Japan, November 19-22, 2017}, pages = {463--468}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CANDAR.2017.91}, doi = {10.1109/CANDAR.2017.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/MoriyamaYST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yamauchi16, author = {Toshihiro Yamauchi}, title = {Foreword}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {4}, pages = {785--786}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015ICF0001}, doi = {10.1587/TRANSINF.2015ICF0001}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yamauchi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakamuraMIKY16, author = {Yuichi Nakamura and Akira Moriguchi and Masanori Irie and Taizo Kinoshita and Toshihiro Yamauchi}, title = {Rule-Based Sensor Data Aggregation System for {M2M} Gateways}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {12}, pages = {2943--2955}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016PAP0020}, doi = {10.1587/TRANSINF.2016PAP0020}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakamuraMIKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/FujiiSYT16, author = {Shota Fujii and Masaya Sato and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Design of Function for Tracing Diffusion of Classified Information for {IPC} on {KVM}}, journal = {J. Inf. Process.}, volume = {24}, number = {5}, pages = {781--792}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.781}, doi = {10.2197/IPSJJIP.24.781}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/FujiiSYT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/FujiiSYT16, author = {Shota Fujii and Masaya Sato and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Evaluation and design of function for tracing diffusion of classified information for file operations with {KVM}}, journal = {J. Supercomput.}, volume = {72}, number = {5}, pages = {1841--1861}, year = {2016}, url = {https://doi.org/10.1007/s11227-016-1671-5}, doi = {10.1007/S11227-016-1671-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/FujiiSYT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SatoYT16, author = {Masaya Sato and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {635--641}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0114}, doi = {10.1109/CANDAR.2016.0114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SatoYT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YamauchiI16, author = {Toshihiro Yamauchi and Yuta Ikegami}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {219--234}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_15}, doi = {10.1007/978-3-319-46298-1\_15}, timestamp = {Thu, 23 Jun 2022 19:57:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/YamauchiI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YamauchiYNMIIGT16, author = {Toshihiro Yamauchi and Yuta Yamamoto and Kengo Nagai and Tsukasa Matono and Shinji Inamoto and Masaya Ichikawa and Masataka Goto and Hideo Taniguchi}, editor = {Sascha Ossowski}, title = {Plate: persistent memory management for nonvolatile main memory}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {1885--1892}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851744}, doi = {10.1145/2851613.2851744}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/YamauchiYNMIIGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YuY15, author = {Jing Yu and Toshihiro Yamauchi}, title = {Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android {OS}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {98-D}, number = {4}, pages = {807--811}, year = {2015}, url = {https://doi.org/10.1587/transinf.2014ICL0001}, doi = {10.1587/TRANSINF.2014ICL0001}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YuY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamauchiTT15, author = {Toshihiro Yamauchi and Masahiro Tsuruya and Hideo Taniguchi}, title = {Fast Control Method of Software-Managed {TLB} for Reducing Zero-Copy Communication Overhead}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {98-D}, number = {12}, pages = {2187--2191}, year = {2015}, url = {https://doi.org/10.1587/transinf.2015PAL0003}, doi = {10.1587/TRANSINF.2015PAL0003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamauchiTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NakamuraSY15, author = {Yuichi Nakamura and Yoshiki Sameshima and Toshihiro Yamauchi}, title = {Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {664--672}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.664}, doi = {10.2197/IPSJJIP.23.664}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/NakamuraSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SatoYT15, author = {Masaya Sato and Toshihiro Yamauchi and Hideo Taniguchi}, title = {Process Hiding by Virtual Machine Monitor for Attack Avoidance}, journal = {J. Inf. Process.}, volume = {23}, number = {5}, pages = {673--682}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.673}, doi = {10.2197/IPSJJIP.23.673}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/SatoYT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmu/NakamuraMY15, author = {Yuichi Nakamura and Akira Moriguchi and Toshihiro Yamauchi}, title = {{CSDA:} Rule-based complex sensor data aggregation system for {M2M} gateway}, booktitle = {Eighth International Conference on Mobile Computing and Ubiquitous Networking, {ICMU} 2015, Hakodate, Japan, January 20-22, 2015}, pages = {108--113}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICMU.2015.7061051}, doi = {10.1109/ICMU.2015.7061051}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmu/NakamuraMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/IkegamiY15, author = {Yuta Ikegami and Toshihiro Yamauchi}, title = {Attacker Investigation System Triggered by Information Leakage}, booktitle = {{IIAI} 4th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015}, pages = {24--27}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IIAI-AAI.2015.247}, doi = {10.1109/IIAI-AAI.2015.247}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/IkegamiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/AkaoY15, author = {Yohei Akao and Toshihiro Yamauchi}, title = {Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features}, booktitle = {{IIAI} 4th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015}, pages = {721--722}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IIAI-AAI.2015.243}, doi = {10.1109/IIAI-AAI.2015.243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/AkaoY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SatoY14, author = {Masaya Sato and Toshihiro Yamauchi}, title = {Secure and Fast Log Transfer Mechanism for Virtual Machine}, journal = {J. Inf. Process.}, volume = {22}, number = {4}, pages = {597--608}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.597}, doi = {10.2197/IPSJJIP.22.597}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/SatoY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SakamotoONY14, author = {Shunya Sakamoto and Kenji Okuda and Ryo Nakatsuka and Toshihiro Yamauchi}, title = {DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {2}, pages = {55--69}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.05.31.055}, doi = {10.22667/JISIS.2014.05.31.055}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SakamotoONY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YoshizakiY14, author = {Kota Yoshizaki and Toshihiro Yamauchi}, title = {Malware Detection Method Focusing on Anti-debugging Functions}, booktitle = {Second International Symposium on Computing and Networking, {CANDAR} 2014, Shizuoka, Japan, December 10-12, 2014}, pages = {563--566}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CANDAR.2014.36}, doi = {10.1109/CANDAR.2014.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YoshizakiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY14, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Complicating Process Identification by Replacing Process Information for Attack Avoidance}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {33--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_3}, doi = {10.1007/978-3-319-09843-2\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YamauchiHT13, author = {Toshihiro Yamauchi and Takayuki Hara and Hideo Taniguchi}, title = {A mechanism for achieving a bound on execution performance of process group to limit {CPU} abuse}, journal = {J. Supercomput.}, volume = {65}, number = {1}, pages = {38--60}, year = {2013}, url = {https://doi.org/10.1007/s11227-011-0707-0}, doi = {10.1007/S11227-011-0707-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YamauchiHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/YuY13, author = {Jing Yu and Toshihiro Yamauchi}, title = {Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android {OS}}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications {\&} 2013 {IEEE} International Conference on Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China, November 13-15, 2013}, pages = {1628--1633}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCC.and.EUC.2013.229}, doi = {10.1109/HPCC.AND.EUC.2013.229}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/YuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY13, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Secure Log Transfer by Replacing a Library in a Virtual Machine}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_1}, doi = {10.1007/978-3-642-41383-4\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/OtsuboUYT13, author = {Nobuto Otsubo and Shinichiro Uemura and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {235--242}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_30}, doi = {10.1007/978-94-007-6738-6\_30}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mue/OtsuboUYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/SakamotoONY13, author = {Syunya Sakamoto and Kenji Okuda and Ryo Nakatsuka and Toshihiro Yamauchi}, editor = {James J. Park and Joseph Kee{-}Yin Ng and Hwa{-}Young Jeong and Agustinus Borgy Waluyo}, title = {DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android}, booktitle = {Multimedia and Ubiquitous Engineering, {MUE} 2013, May 9-11, 2013, Seoul, Korea}, series = {Lecture Notes in Electrical Engineering}, volume = {240}, pages = {243--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-94-007-6738-6\_31}, doi = {10.1007/978-94-007-6738-6\_31}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mue/SakamotoONY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SakodaYT13, author = {Takeshi Sakoda and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Leonard Barolli and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa and James J. Park}, title = {Evaluation of Load Balancing in Multicore Processor for AnT}, booktitle = {16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013}, pages = {360--365}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/NBiS.2013.57}, doi = {10.1109/NBIS.2013.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/SakodaYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/FurukawaYT12, author = {Yuuki Furukawa and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Leonard Barolli and David Taniar and Tomoya Enokido and J. Wenny Rahayu and Makoto Takizawa}, title = {Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling}, booktitle = {15th International Conference on Network-Based Information Systems, NBiS 2012, Melbourne, Australia, September 26-28, 2012}, pages = {459--464}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/NBiS.2012.79}, doi = {10.1109/NBIS.2012.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/FurukawaYT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2012, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5}, doi = {10.1007/978-3-642-34117-5}, isbn = {978-3-642-34116-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SatoY11, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {A Min Tjoa and Gerald Quirchmayr and Ilsun You and Lida Xu}, title = {{VMBLS:} Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss}, booktitle = {Availability, Reliability and Security for Business, Enterprise and Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August 22-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6908}, pages = {176--190}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23300-5\_14}, doi = {10.1007/978-3-642-23300-5\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SatoY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/MoriyamaYT11, author = {Hideaki Moriyama and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Hyung Rim Choi and Soongoo Hong and Franz I. S. Ko}, title = {Control method of multiple services for {CMP} based on continuation model}, booktitle = {Proceedings of the 4th International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2011), Busan, Korea, August 16-18, 2011}, pages = {83--89}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6014537}, timestamp = {Tue, 02 Mar 2021 08:49:01 +0100}, biburl = {https://dblp.org/rec/conf/interaction/MoriyamaYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NakamuraSY10, author = {Yuichi Nakamura and Yoshiki Sameshima and Toshihiro Yamauchi}, title = {SELinux Security Policy Configuration System with Higher Level Language}, journal = {J. Inf. Process.}, volume = {18}, pages = {201--212}, year = {2010}, url = {https://doi.org/10.2197/ipsjjip.18.201}, doi = {10.2197/IPSJJIP.18.201}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/NakamuraSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnit/YamauchiFT10, author = {Toshihiro Yamauchi and Kazuhiro Fukutomi and Hideo Taniguchi}, title = {{ISIPC:} Instant Synchronous Interprocess Communication}, journal = {J. Next Gener. Inf. Technol.}, volume = {1}, number = {3}, pages = {75--83}, year = {2010}, url = {http://www.humanpub.org/jnit/ppl/JNIT0103\_09.pdf}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnit/YamauchiFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YamamotoY10, author = {Kenji Yamamoto and Toshihiro Yamauchi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Evaluation of Performance of Secure {OS} Using Performance Evaluation Mechanism of LSM-Based {LSMPMON}}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {57--67}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_7}, doi = {10.1007/978-3-642-17610-4\_7}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YamamotoY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YamauchiHT10, author = {Toshihiro Yamauchi and Takayuki Hara and Hideo Taniguchi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {A Mechanism That Bounds Execution Performance for Process Group for Mitigating {CPU} Abuse}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {84--93}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_10}, doi = {10.1007/978-3-642-17610-4\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YamauchiHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/FurukawaYT10, author = {Yuuki Furukawa and Toshihiro Yamauchi and Hideo Taniguchi}, editor = {Tai{-}Hoon Kim and Young{-}Hoon Lee and Byeong Ho Kang and Dominik Slezak}, title = {Proposal for Sophisticated Periodic Execution Control in Embedded Systems}, booktitle = {Future Generation Information Technology - Second International Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6485}, pages = {549--563}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17569-5\_54}, doi = {10.1007/978-3-642-17569-5\_54}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/FurukawaYT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.